summaryrefslogtreecommitdiff
path: root/lib/libssl/man
AgeCommit message (Collapse)Author
2024-07-14Document SSL_CIPHER_get_handshake_digest(3)Theo Buehler
2024-07-13ssl2.h and ssl23.h join the party in the atticTheo Buehler
Now that the SSL2 client hello support is gone, nothing uses this anymore, except that a few ports still need SSL2_VERSION. ok beck
2024-07-11Adjust documentation for SSL_select_next_proto()Theo Buehler
Use better argument names, add a link to the relevant standards and add CAVEATS and BUGS sections pointing out a few pitfalls. discussed with davidben ok beck
2024-06-28The ALPN callback should really ignore the out parameter if there'sTheo Buehler
no overlap. Document that explicitly. Also make it more explicit that that the caller must work with a copy of out. ok jsing
2024-05-23Make signature of SSL_COMP_add_compression_method(3) match realityTheo Buehler
2024-05-16SSL_CTX_set_keylog_callback: copy-paste error _set_ -> _get_Theo Buehler
2024-05-09sync the SSL text; ok tbJason McIntyre
2024-05-08Avoid OpenSSL SSL repetitionsTheo Buehler
with the help of jmc
2024-01-13Remove mention of a refcount bugTheo Buehler
Said bug was fixed in OpenSSL 1.0.0, released 14 years ago. It is of course unsurprising that you may accidentally increment the refcount if your idiom for decrementing it is CRYPTO_add(&bio-references, -1, CRYPTO_LOCK_BIO)).
2024-01-13BIO_f_ssl.3: Remove explicit library initializationTheo Buehler
2023-09-19Mention a subtle difference between PEM_def_callback(3) and the example.Ingo Schwarze
It's relevant not only for the example, but also because the functions documented here use PEM_def_callback(3) by default, and that exhibits surprising and potentially dangerous behaviour by not NUL-terminating. OK tb@
2023-09-19Remove the duplicate documentation of pem_password_cb(3).Ingo Schwarze
While here, also: * Avoid the misleading term "default password callback" because none of the functions in SSL_CTX_use_certificate(3) support overriding it. * Do not talk about "storing", "writing", and "encryption" since the cb passed to SSL_CTX_set_default_passwd_cb(3) is never used for any of that. * List the functions using cb. * Document what happens by default. * Remove the misleading words "which must be provided by the application" because all this is actually optional. * Make several wordings more precise. * Below EXAMPLES, fix argument naming to agree with pem_password_cb(3), clarify the description of what the example does, and, as suggested by tb@, use strlcpy(3). OK tb@
2023-04-11Document the RETURN VALUES of BIO_method_type(3) and BIO_method_name(3)Ingo Schwarze
for the various BIO types.
2022-12-18document the interaction with BIO_dup_chain(3)Ingo Schwarze
2022-12-11Add a small blurb on @SECLEVEL=nTheo Buehler
2022-09-17Link to SSL_read_early_data(3)Klemens Nanni
OK tb
2022-09-10fix repeated wordsJonathan Gray
ok ok miod@ ack ack jmc@
2022-07-17AESCGM -> AESGCMJonathan Gray
2022-07-13add .Xr links to SSL_CTX_set_security_level(3)Ingo Schwarze
2022-07-13Start documenting our new pet octopus, SSL_CTX_set_security_level(3).Ingo Schwarze
Or should we call it a centipede? Feedback and OK on a previous version from jsing@ and from our chief myriapodologist, tb@.
2022-03-31man pages: add missing commas between subordinate and main clausesChristian Weisgerber
jmc@ dislikes a comma before "then" in a conditional, so leave those untouched. ok jmc@
2022-03-29man pages: add missing word, The foo() ... -> The foo() function ...Christian Weisgerber
ok jmc@ schwarze@
2022-03-29man pages: add missing commas in enumerationsChristian Weisgerber
2022-02-18Avoid gendered language in man pages when not referring to a specificJonathan Gray
person. Rewrite or use singular they. ok thfr@ sthen@ daniel@ ian@ job@ kmos@ jcs@ ratchov@ phessler@ and others I'm likely missing on an earlier version. feedback tj@, feedback and ok jmc@
2022-02-06remove please from manual pagesJonathan Gray
ok jmc@ sthen@ millert@
2022-01-25Rewrite paragraph to refer to EVP_CIPHER_CTX_new() and HMAC_CTX_new()Theo Buehler
to match reality. spotted by/ok jmc
2022-01-15spellingJonathan Gray
ok tb@
2021-11-30s/ECDHE/ECDH/Joel Sing
If we can provide an EC key that is used, then it is by definition non-ephemeral. ok tb@
2021-11-26spellingJonathan Gray
ok schwarze@
2021-10-27Fix HISTORY section: 6.9 -> 7.0Theo Buehler
2021-10-25sort. alphanumerics have lower ASCII values than '_'Theo Buehler
2021-10-25Install SSL_read_early_data.3. I should have done this during the lastTheo Buehler
libssl bump.
2021-10-24merge documentation for SSL_read_ex(3), SSL_peek_ex(3), and SSL_write_ex(3)Ingo Schwarze
from the OpenSSL 1.1.1 branch, which is still under a free license
2021-10-23fix wrong and missing return types and wrong macros in the SYNOPSIS;Ingo Schwarze
while here, also apply some minor wording improvements
2021-10-23Add new OpenSSL API SSL_CTX_set_num_tickets and friends.Bob Beck
Since we don't support session tickets in LibreSSL at the moment these functions currently do not have any effect. Again, symbols will appear with tb@'s reptar sized bump.. ok tb@
2021-10-23oops, wrong dir.Theo Buehler
pointed out by schwarze
2021-10-23Import documentation for X509_get_extension_flags, X509_get_key_usage,Theo Buehler
X509_get_extended_key_usage from OpenSSL. Will be linked to the build after the bump. input/lgtm schwarze
2021-10-23Import documentation for X509_SIG_get{0,m} from OpenSSL. Will be linkedTheo Buehler
to the build after the bump. tweak & lgtm schwarze
2021-10-23tweak previous: properly mark up function pointer typedefIngo Schwarze
plus .Dv NULL, SEE ALSO, HISTORY
2021-10-23Add SSL_CTX_set_keylog_callback and SSL_CTX_get_keylog_callbackBob Beck
Some things in ports care about calling these functions. Since we will not provide private key logging functionality they are documented as being for compatibility and that they don't do anything. ok tb@
2021-09-14provide a small manual page for the SSL_set_psk_use_session_callback(3)Ingo Schwarze
stub, written from scratch; OK tb@ on SSL_set_psk_use_session_callback.3
2021-09-14Merge the stub SSL_SESSION_is_resumable(3) manual page from theIngo Schwarze
OpenSSL 1.1.1 branch, which is still under a free license. A few tweaks to wording and structure by me. OK tb@ on SSL_SESSION_is_resumable.3
2021-09-11merge the description of SSL_get_tlsext_status_type(3)Ingo Schwarze
from the OpenSSL 1.1.1 branch, which is still under a free license
2021-09-10Do not ignore SSL_TLSEXT_ERR_FATAL from the ALPN callbackTheo Buehler
As reported by Jeremy Harris, we inherited a strange behavior from OpenSSL, in that we ignore the SSL_TLSEXT_ERR_FATAL return from the ALPN callback. RFC 7301, 3.2 states: 'In the event that the server supports no protocols that the client advertises, then the server SHALL respond with a fatal "no_application_protocol" alert.' Honor this requirement and succeed only on SSL_TLSEXT_ERR_{OK,NOACK} which is the current behavior of OpenSSL. The documentation change is taken from OpenSSL 1.1.1 as well. As pointed out by jsing, there is more to be fixed here: - ensure that the same protocol is selected on session resumption - should the callback be called even if no ALPN extension was sent? - ensure for TLSv1.2 and earlier that the SNI has already been processed ok beck jsing
2021-09-01comment out the detailed description of SSL_get_servername(3),Ingo Schwarze
leaving only the basic description in the RETURN VALUES section; tb@ pointed out LibreSSL does not currently provide all those guarantees, and he also OK'ed this diff
2021-08-30sync with OpenSSL 1.1.1, which is still under a free license;Ingo Schwarze
in particular, this includes new text by Matt Caswell from OpenSSL commit 721eb8f6 Nov 28 12:03:00 2019 +0000 and corrects a wrong argument type that i introduced into the SYNOPSIS; requested by tb@
2021-06-26Fix .Xr order. From mandoc -Tlint.Theo Buehler
2021-06-12space between macro args and punctuation;Jason McIntyre
2021-06-12RFC 4507bis can refer to various RFCs but this instance is aboutTheo Buehler
RFC 5077. Note that session resumption via session tickets is only for TLSv1.2 and earlier. prompted by a question by/ok jmc
2021-06-11space between RFC and number;Jason McIntyre